BARRY MOTHERFUCKING DORRANS
12.11.2025 22:31 — 👍 0 🔁 1 💬 0 📌 0@jkuemerle.infosec.exchange.ap.brid.gy
Application security engineer, developer and speaker in the greater New York City area specializing in application security, development, database and […] [bridged from https://infosec.exchange/@jkuemerle on the fediverse by https://fed.brid.gy/ ]
BARRY MOTHERFUCKING DORRANS
12.11.2025 22:31 — 👍 0 🔁 1 💬 0 📌 0@Sempf you know you can fix that by just removing all CR/LF, then you will have a 1 line JSON file 😀
22.07.2025 13:27 — 👍 0 🔁 1 💬 1 📌 0This is great!
Flightaware: Falsehoods Programmers Believe About Aviation
https://flightaware.engineering/falsehoods-programmers-believe-about-aviation/
#aviation #software
New by me: - the growing cost of vendor lock-in: a security story.
https://sempf.net/post/the-cost-of-lockin
#privacy #technology
Going to be in the Boston area on April 5? Come on out to @owaspboston for an awesome conference! If you want to talk about using gamification and CTFs to make security training fun and engaging there is a session just for that :) […]
20.03.2025 17:03 — 👍 0 🔁 0 💬 0 📌 0Morning, nerds! Who's ready for #codemash??
12.01.2025 13:16 — 👍 0 🔁 1 💬 1 📌 0Screenshot of a hex editor with a PE file open, on the left there's a tree with the headers, sections and other parts of the file format. On the right there's a typical table of bytes in hex.
Finally had time over the holidays to realize a long-standing dream of mine: a hex editor that knows about the PE file and .NET metadata format. You can click any byte and it will show you which data structure it is in the tree. Every byte is covered.
The […]
[Original post on mastodon.social]